Virus Information News

"With How To Master CSS, you'll discover how
to read stylesheets, how to recognise the best solution and how to translate
a graphical design to a real website, simply by watching my fun and sophisticated
training videos. Hundreds of people, just like you, worldwide have used my unique
multimedia course to fast-track their Stylesheet learning, while having
piles of fun in the process. Will you be next?"

It doesn't matter what level you are at now (beginner or intermediate),
How to Master CSS is packed full of quality step-by-step
lessons, video files, an editor and other resources to get YOU results fast!

Britain's Defense Ministry has announced it is creating a military cyber unit and has welcomed tech-savvy hackers to consider taking the Queen's virtual shilling in a recruitment drive starting October.

The UK is channeling part of its military budget on recruiting hundreds of computer experts to constitute the new Joint Cyber Reserve Unit, the country's Defense Secretary, Philip Hammond, announced Sunday. For the first time, the UK's would-be cyber warriors will be tasked with offensive missions.

An appeals court filing Friday suggests the US Department of Justice was quick to serve a court order on encrypted email provider Lavabit after customer Edward Snowden, presumably the target, went public as an NSA whistleblower.

Snowden, an NSA contractor who distributed to news outlets classified information about National Security Agency mass-surveillance programs, revealed himself as the leaker on June 9 in Hong Kong. The next day, the Justice Department (DOJ) demanded Texas-based Lavabit hand over metadata on an unnamed customer that timing suggests was Snowden, who used Lavabit for protected email service. The records order was "issued under 18 USC 2703(d), a 1994 amendment to the Stored Communications Act that allows law enforcement access to non-content internet records without demonstrating the 'probable cause' needed for a search warrant," according to Wired. Such records can include 'To' and 'From' lines in emails and the IP addresses used to access the account, but not the content of any emails.

'Dead Drops' is an anonymous, offline, peer to peer file-sharing network in public space.

USB flash drives are embedded into walls, buildings and curbs accessible to anybody in public space. Everyone is invited to drop or find files on a dead drop. Plug your laptop to a wall, house or pole to share your favorite files and data. Each dead drop is installed empty except a readme.txt file explaining the project...

A college student was arrested Thursday for allegedly hijacking the webcams of young women - among them reigning Miss Teen USA Cassidy Wolf - taking nude images, then blackmailing his victims to send him more explicit material or else be exposed.

Jared James Abrahams, a 19-year-old computer science student from Temecula, California, surrendered on Thursday to the FBI on federal extortion charges, the agency announced. Authorities say he victimized young women surreptitiously, by taking control of their computers then photographing them as they changed out of their clothes. When he admitted what he'd done in June, Abrahams said he had 30 to 40 "slave computers" - or other people's electronic devices he controlled - and has had as many as 150 total, according to a criminal complaint.

In a surprise development, it has been reported that several months ago Britain's National Cyber Crime Unit "secretly" arrested a 16-year-old London schoolboy on suspicion of being involved in the "biggest cyberattack in the history of the Internet."

The arrest of the teenager, whose name is not being disclosed, is a part of the investigation into the distributed-denial-of-service (DDoS) attack on Spamhaus on March 20 this year. That day, servers of the Dutch anti-spam organization, which tracks e-mail spammers and spam activity, were at one point being inundated with 300 billion bits per second (300Gbps) of data, three times larger than the previous record attack of 100 Gbps. The teenager fell under suspicion after "significant sums of money" were found to be "flowing through his bank account," the London Evening Standard reported Thursday.

A bipartisan group of US lawmakers has introduced legislation that, if approved, would attempt to strengthen civil liberties and curb the power of the secret FISA courts that approved widespread foreign and domestic NSA surveillance policies.

The bill, dubbed the Intelligence Oversight and Surveillance Reform Act, bundles a number of ideas proposed in roughly 12 other bills drafted in the wake of the leaks by NSA contractor-turned whistleblower Edward Snowden, which first began in June. The legislation would prevent the National Security Agency from bulk-collecting Americans' phone records under section 215 of the Patriot Act, easily the most polarizing stipulation in that law. The bill would also eliminate the NSA's authority to install so-called "backdoors" to monitor Americans' various methods of internet communication.

To give people a better Firefox experience, weâ€™re changing the way plugins work. Earlier this year we talked about our plan for putting users in control of their plugins.

We are now seeing these plans take shape in the latest version of Firefox Aurora. To give people more control over their browser, Firefox will no longer activate most plugins by default. When a site tries to use a plugin, the user will be able to choose whether to enable the plugin on that site.

The Netscape Plug-in API (NPAPI) ushered in an early era of web innovation by offering the first standard mechanism to extend the browser.

In fact, many modern web platform features-including video and audio support-first saw mainstream deployment through NPAPI-based plug-ins. But the web has evolved. Today's browsers are speedier, safer, and more capable than their ancestors. Meanwhile, NPAPI's 90s-era architecture has become a leading cause of hangs, crashes, security incidents, and code complexity. Because of this, Chrome will be phasing out NPAPI support over the coming year.